config/hosts/hel1-a/configuration.nix

321 lines
8.9 KiB
Nix
Raw Normal View History

2023-04-03 16:50:52 +03:00
{
config,
pkgs,
lib,
2023-04-14 14:12:45 +03:00
agenix,
myData,
2023-04-03 16:50:52 +03:00
...
2023-08-14 09:09:14 +03:00
}: {
2023-04-03 16:50:52 +03:00
imports = [
./hardware-configuration.nix
./zfs.nix
];
2023-01-03 12:31:37 +02:00
2023-04-14 14:12:45 +03:00
mj = {
stateVersion = "22.11";
timeZone = "UTC";
2023-07-18 16:32:45 +03:00
base = {
zfs.enable = true;
2023-07-20 15:02:38 +03:00
users.passwd = {
root.passwordFile = config.age.secrets.root-passwd-hash.path;
motiejus.passwordFile = config.age.secrets.motiejus-passwd-hash.path;
};
2023-07-18 16:32:45 +03:00
initrd = {
enable = true;
2023-07-23 15:58:54 +03:00
authorizedKeys =
(builtins.attrValues myData.people_pubkeys)
++ [myData.hosts."vno1-oh2.servers.jakst".publicKey];
2023-07-18 16:32:45 +03:00
hostKeys = ["/etc/secrets/initrd/ssh_host_ed25519_key"];
};
snapshot = {
enable = true;
mountpoints = ["/var/lib" "/var/log"];
};
2023-07-19 14:16:56 +03:00
zfsborg = {
enable = true;
2023-07-20 15:02:38 +03:00
passwordPath = config.age.secrets.borgbackup-password.path;
2023-07-19 14:16:56 +03:00
mountpoints = {
"/var/lib" = {
2023-07-26 12:59:19 +03:00
repo = "zh2769@zh2769.rsync.net:hel1-a.servers.jakst-var_lib";
2023-07-19 14:16:56 +03:00
paths = [
"/var/lib/.snapshot-latest/gitea"
"/var/lib/.snapshot-latest/headscale"
"/var/lib/.snapshot-latest/matrix-synapse"
];
2023-07-26 12:59:19 +03:00
backup_at = "*-*-* 00:05:00";
2023-07-19 14:16:56 +03:00
};
"/var/log" = {
2023-07-26 12:59:19 +03:00
repo = "zh2769@zh2769.rsync.net:hel1-a.servers.jakst-var_log";
2023-07-19 14:16:56 +03:00
paths = ["/var/log/.snapshot-latest/caddy/"];
patterns = [
"+ /var/log/.snapshot-latest/caddy/access-jakstys.lt.log-*.zst"
"- *"
];
2023-07-26 12:59:19 +03:00
backup_at = "*-*-* 00:01:00";
2023-07-19 14:16:56 +03:00
};
};
};
2023-07-20 06:58:47 +03:00
unitstatus = {
enable = true;
email = "motiejus+alerts@jakstys.lt";
};
};
services = {
2023-08-18 09:31:19 +03:00
node_exporter.enable = true;
2023-08-06 00:47:32 +03:00
2023-08-24 23:34:48 +03:00
gitea.enable = true;
2023-08-24 23:44:18 +03:00
headscale = {
enable = true;
clientOidcPath = config.age.secrets.headscale-client-oidc.path;
subnetCIDR = myData.tailscale_subnet.cidr;
};
2023-07-30 06:41:57 +03:00
deployerbot = {
follower = {
enable = true;
uidgid = myData.uidgid.updaterbot-deployee;
publicKey = myData.hosts."vno1-oh2.servers.jakst".publicKey;
};
};
postfix = {
enable = true;
saslPasswdPath = config.age.secrets.sasl-passwd.path;
};
zfsunlock = {
enable = true;
targets."vno1-oh2.servers.jakst" = let
host = myData.hosts."vno1-oh2.servers.jakst";
in {
sshEndpoint = host.publicIP;
pingEndpoint = host.jakstIP;
remotePubkey = host.initrdPubKey;
pwFile = config.age.secrets.zfs-passphrase-vno1-oh2.path;
startAt = "*-*-* *:00/5:00";
};
2023-07-20 06:58:47 +03:00
};
};
2023-01-03 12:31:37 +02:00
};
2023-07-20 11:56:08 +03:00
environment.systemPackages = with pkgs; [
nixos-option
graphicsmagick
];
2023-04-14 14:12:45 +03:00
services = {
tailscale.enable = true;
2023-04-14 14:12:45 +03:00
nsd = {
enable = true;
2023-07-18 12:31:48 +03:00
interfaces = ["0.0.0.0" "::"];
2023-04-14 14:12:45 +03:00
zones = {
"jakstys.lt.".data = myData.jakstysLTZone;
};
2023-02-25 15:55:08 +02:00
};
2023-01-04 10:06:52 +02:00
caddy = {
enable = true;
email = "motiejus+acme@jakstys.lt";
2023-05-08 17:02:58 +03:00
virtualHosts."recordrecap.jakstys.lt".extraConfig = ''
reverse_proxy vno1-oh2.servers.jakst:8080
2023-05-08 15:53:56 +03:00
'';
2023-03-26 14:13:30 +03:00
virtualHosts."www.jakstys.lt".extraConfig = ''
redir https://jakstys.lt
'';
2023-05-04 03:18:29 +03:00
virtualHosts."fwmine.jakstys.lt".extraConfig = ''
reverse_proxy fwmine.motiejus.jakst:8080
'';
2023-03-26 14:13:30 +03:00
virtualHosts."jakstys.lt" = {
2023-01-17 15:12:08 +02:00
logFormat = ''
2023-04-03 16:50:52 +03:00
output file ${config.services.caddy.logDir}/access-jakstys.lt.log {
roll_disabled
}
2023-01-17 15:12:08 +02:00
'';
extraConfig = ''
2023-04-13 11:57:42 +03:00
header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
2023-01-17 15:12:08 +02:00
header /_/* Cache-Control "public, max-age=31536000, immutable"
2023-04-13 11:57:42 +03:00
2023-01-17 15:12:08 +02:00
root * /var/www/jakstys.lt
file_server {
precompressed br gzip
}
2023-01-17 15:12:08 +02:00
@matrixMatch {
path /.well-known/matrix/client
path /.well-known/matrix/server
}
header @matrixMatch Content-Type application/json
header @matrixMatch Access-Control-Allow-Origin *
header @matrixMatch Cache-Control "public, max-age=3600, immutable"
2023-01-17 15:12:08 +02:00
handle /.well-known/matrix/client {
respond "{\"m.homeserver\": {\"base_url\": \"https://jakstys.lt\"}}" 200
}
handle /.well-known/matrix/server {
respond "{\"m.server\": \"jakstys.lt:443\"}" 200
}
2023-01-17 15:12:08 +02:00
handle /_matrix/* {
2023-03-04 10:10:31 +02:00
encode gzip
2023-03-26 15:40:36 +03:00
reverse_proxy http://127.0.0.1:8008
2023-01-17 15:12:08 +02:00
}
'';
};
2023-01-03 18:39:41 +02:00
};
# TODO: app_service_config_files
2023-03-08 16:03:30 +02:00
matrix-synapse = {
2023-03-21 13:43:34 +02:00
enable = true;
2023-03-08 16:03:30 +02:00
settings = {
server_name = "jakstys.lt";
admin_contact = "motiejus@jakstys.lt";
enable_registration = false;
report_stats = true;
2023-04-14 14:12:45 +03:00
signing_key_path = "/run/matrix-synapse/jakstys_lt_signing_key";
2023-04-03 16:50:52 +03:00
extraConfigFiles = ["/run/matrix-synapse/secrets.yaml"];
2023-03-19 21:13:48 +02:00
log_config = pkgs.writeText "log.config" ''
2023-03-08 16:03:30 +02:00
version: 1
formatters:
precise:
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
handlers:
console:
class: logging.StreamHandler
formatter: precise
loggers:
synapse.storage.SQL:
2023-04-04 09:27:03 +03:00
level: WARN
2023-03-08 16:03:30 +02:00
root:
2023-04-05 08:29:17 +03:00
level: ERROR
2023-03-08 16:03:30 +02:00
handlers: [console]
disable_existing_loggers: false
'';
public_baseurl = "https://jakstys.lt/";
database.name = "sqlite3";
url_preview_enabled = false;
max_upload_size = "50M";
rc_messages_per_second = 0.2;
rc_message_burst_count = 10.0;
federation_rc_window_size = 1000;
federation_rc_sleep_limit = 10;
federation_rc_sleep_delay = 500;
federation_rc_reject_limit = 50;
federation_rc_concurrent = 3;
2023-03-19 21:13:48 +02:00
allow_profile_lookup_over_federation = false;
thumbnail_sizes = [
2023-04-03 16:50:52 +03:00
{
width = 32;
height = 32;
method = "crop";
}
{
width = 96;
height = 96;
method = "crop";
}
{
width = 320;
height = 240;
method = "scale";
}
{
width = 640;
height = 480;
method = "scale";
}
{
width = 800;
height = 600;
method = "scale";
}
2023-03-19 21:13:48 +02:00
];
user_directory = {
enabled = true;
search_all_users = false;
prefer_local_users = true;
};
allow_device_name_lookup_over_federation = false;
email = {
smtp_host = "127.0.0.1";
smtp_port = 25;
notf_for_new_users = false;
notif_from = "Jakstys %(app)s homeserver <noreply@jakstys.lt>";
};
include_profile_data_on_invite = false;
password_config.enabled = true;
require_auth_for_profile_requests = true;
2023-03-08 16:03:30 +02:00
};
};
logrotate = {
settings = {
2023-03-26 14:13:30 +03:00
"/var/log/caddy/access-jakstys.lt.log" = {
rotate = 60;
frequency = "daily";
dateext = true;
dateyesterday = true;
compress = true;
compresscmd = "${pkgs.zstd}/bin/zstd";
compressext = ".zst";
compressoptions = "--long -19";
uncompresscmd = "${pkgs.zstd}/bin/unzstd";
2023-01-17 15:12:08 +02:00
postrotate = "${pkgs.systemd}/bin/systemctl restart caddy";
};
};
};
2023-01-03 12:31:37 +02:00
};
2023-01-04 10:06:52 +02:00
networking = {
hostName = "hel1-a";
2023-07-26 11:36:54 +03:00
domain = "servers.jakst";
2023-08-14 09:09:14 +03:00
firewall = {
2023-03-01 15:05:58 +02:00
allowedTCPPorts = [
2023-03-21 15:01:06 +02:00
53
2023-04-03 16:50:52 +03:00
80
443
2023-03-01 15:05:58 +02:00
];
2023-03-26 15:40:36 +03:00
allowedUDPPorts = [
2023-04-03 16:50:52 +03:00
53
443
2023-04-05 08:32:26 +03:00
41641 # tailscale
2023-03-26 15:40:36 +03:00
];
2023-03-01 14:17:27 +02:00
logRefusedConnections = false;
2023-03-29 22:21:16 +03:00
checkReversePath = "loose"; # for tailscale
2023-01-04 10:06:52 +02:00
};
2023-01-03 12:31:37 +02:00
};
2023-03-21 13:43:34 +02:00
systemd.tmpfiles.rules = [
"d /run/matrix-synapse 0700 matrix-synapse matrix-synapse -"
];
systemd.services = {
matrix-synapse = let
# TODO https://github.com/NixOS/nixpkgs/pull/222336 replace with `preStart`
secretsScript = pkgs.writeShellScript "write-secrets" ''
2023-08-14 14:50:53 +03:00
set -xeuo pipefail
umask 077
ln -sf ''${CREDENTIALS_DIRECTORY}/jakstys_lt_signing_key /run/matrix-synapse/jakstys_lt_signing_key
cat > /run/matrix-synapse/secrets.yaml <<EOF
registration_shared_secret: "$(cat ''${CREDENTIALS_DIRECTORY}/registration_shared_secret)"
macaroon_secret_key: "$(cat ''${CREDENTIALS_DIRECTORY}/macaroon_secret_key)"
EOF
'';
in {
serviceConfig.ExecStartPre = ["" secretsScript];
serviceConfig.LoadCredential = [
"jakstys_lt_signing_key:${config.age.secrets.synapse-jakstys-signing-key.path}"
"registration_shared_secret:${config.age.secrets.synapse-registration-shared-secret.path}"
"macaroon_secret_key:${config.age.secrets.synapse-macaroon-secret-key.path}"
];
};
2023-03-01 14:55:57 +02:00
};
2023-01-03 12:31:37 +02:00
}